DISTRIBUTED MANAGEMENT THREE APPROACHES ARE BEING DEFINED MIB BASED EXPRESSION MIB EVENT MIB NOTIFICATION LOG MIB SCRIPT BASED SCRIPT MIB SCHEDULE MIB.

Slides:



Advertisements
Similar presentations
Certification Test Tool Jon Wheeler Test Lead Microsoft Corporation.
Advertisements

Ted Hesselroth USCMS T3 Meeting Abhishek Singh Rana and Frank Wuerthwein UC San Diego Ted Hesselroth STAF/STAX OSG Storage Demo of.
The Functions and Purposes of Translators Code Generation (Intermediate Code, Optimisation, Final Code), Linkers & Loaders.
Chapter 19: Network Management Business Data Communications, 4e.
ManageEngine TM Applications Manager 8 Monitoring Custom Applications.
EXTENSIBLE AGENTS FACILITATE THE EXTENSION OF SNMP AGENTS WITH NEW MIB MODULES SEPARATE SNMP PROTOCOL ENGINE FROM MIB INSTRUMENTATION ALLOW DYNAMIC ADDITION.
Wesley Budziwojski Senior Architect Sun ONE Portal Server Web Services for Remote Portlets, WSRP Jun/2003.
REMOTE MONITORING RMON1 (RFC DRAFT) TOKEN RING EXTENSIONS TO RMON (RFC PROPOSED) RMON2 (RFC PROPOSED) SMON (RFC PROPOSED) Copyright.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
SNMPv2 OVERVIEW: LIMITATIONS OF SNMPv1 HISTORY OF SNMPv2 HIERARCHIES SECURITY SNMPv2 PROTOCOL OPERATIONS TRANSPORT INDEPENDENCE RFCs Copyright © 2001 by.
SNMP GOALS UBIQUITY PCs AND CRAYs INCLUSION OF MANAGEMENT SHOULD BE INEXPENSIVE SMALL CODE LIMITED FUNCTIONALITY MANAGEMENT EXTENSIONS SHOULD BE POSSIBLE.
Common System Components
November 18, 2004 Embedded System Design Flow Arkadeb Ghosal Alessandro Pinto Daniele Gasperini Alberto Sangiovanni-Vincentelli
Tcl Agent : A flexible and secure mobile-agent system Paper by Robert S. Gray Dartmouth College Presented by Vipul Sawhney University of Pennsylvania.
SNMP PROTOCOL Copyright © 2001 by Aiko Pras These sheets may be used for educational purposes.
The Design Of A Web Document Snapshots Delivery System David Chao College of Business San Francisco State University.
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
DISTRIBUTED PROCESS IMPLEMENTAION BHAVIN KANSARA.
SNMP Monitoring with Kaseya IT Managed Services Defined.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Query Processing in Mobile Databases
Emanuele Pasqualucci Extending AppManager Monitoring with the SNMP Toolkit.
Module 10 Configuring and Managing Storage Technologies.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 4 Web technologies: HTTP, CGI, PHP,Java applets)
Workflow Manager and General Tuning Tips. Topics to discuss… Working with Workflows Working with Tasks General Tuning Tips.
INSERT BOOK COVER 1Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall. Exploring Microsoft Office Access 2010 by Robert Grauer, Keith.
Context Tailoring the DBMS –To support particular applications Beyond alphanumerical data Beyond retrieve + process –To support particular hardware New.
Active Monitoring in GRID environments using Mobile Agent technology Orazio Tomarchio Andrea Calvagna Dipartimento di Ingegneria Informatica e delle Telecomunicazioni.
Stacks. An alternative storage structure for collections of entities is a stack. A stack is a simplified form of a linked list in which all insertions.
June 6 th – 8 th 2005 Deployment Tool Set Synergy 2005.
ASP.NET.. ASP.NET Environment ASP.NET is Microsoft's programming framework that enables the development of Web applications and services. It is an easy.
Chapter 34 Java Technology for Active Web Documents methods used to provide continuous Web updates to browser – Server push – Active documents.
The Network Performance Advisor J. W. Ferguson NLANR/DAST & NCSA.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 3: Operating-System Structures System Components Operating System Services.
Triggers A Quick Reference and Summary BIT 275. Triggers SQL code permits you to access only one table for an INSERT, UPDATE, or DELETE statement. The.
SNMPv3 1.DESIGN REQUIREMENTS 2.BIRTH & FEATURES of SNMPv3 3.ARCHITECTURE 4.SECURE COMMUNICATION - USER SECURITY MODEL (USM) 5. ACCESS CONTROL - VIEW BASED.
Management Platforms. SMFA In TMN the intent is to define a realitivly common set of what can be supported by CMISE network elements and managed via a.
8 1 Chapter 8 Advanced SQL Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
Database Systems Design, Implementation, and Management Coronel | Morris 11e ©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or.
The EDGeS project receives Community research funding 1 Porting Applications to the EDGeS Infrastructure A comparison of the available methods, APIs, and.
Interrupt driven I/O. MIPS RISC Exception Mechanism The processor operates in The processor operates in user mode user mode kernel mode kernel mode Access.
SAN DIEGO SUPERCOMPUTER CENTER Inca Control Infrastructure Shava Smallen Inca Workshop September 4, 2008.
David Adams ATLAS DIAL: Distributed Interactive Analysis of Large datasets David Adams BNL August 5, 2002 BNL OMEGA talk.
Module: Software Engineering of Web Applications Chapter 2: Technologies 1.
9 Copyright © 2009, Oracle. All rights reserved. Deploying and Reporting on ETL Jobs.
© Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Restricted Module 11.
Intermediate Documents (IDOCs) What is an IDoc What is an IDoc An IDoc is simply a data container that is used to exchange information between any two.
Group Communication Theresa Nguyen ICS243f Spring 2001.
Interrupt driven I/O Computer Organization and Assembly Language: Module 12.
© 2007 by Prentice Hall2-1 Introduction to Oracle 10g Chapter 2 Overview of SQL and SQL*Plus James Perry and Gerald Post.
Performance Management (Best Practices) REF: Document ID
Network Management Mechanisms Two major network management protocols: Simple Network Management Protocol (SNMP) Common Management Information Protocol.
Slide 1 2/22/2016 Policy-Based Management With SNMP SNMPCONF Working Group - Interim Meeting May 2000 Jon Saperia.
EValid LoadTest, eV.manger and Validation. Agenda Load Test capability of eValid How to execute load test by using eValid Introduction to eV.manager Validation.
CN8861 Network Management Lecture-6 6th June 2015 Dept. of Electrical & Computer Engineering Ryerson University.
July 19, 2004Joint Techs – Columbus, OH Network Performance Advisor Tanya M. Brethour NLANR/DAST.
1 Kyung Hee University Prof. Choong Seon HONG SNMPv2 MIBs and Conformance SNMPv3 Architecture and Applications.
MIDCOM MIB Juergen Quittek, Martin Stiemerling, Pyda Srisuresh 60th IETF meeting, MIDCOM session.
6 Copyright © 2007, Oracle. All rights reserved. Managing Security and Metadata.
Microsoft Visual Basic 2015 CHAPTER ONE Introduction to Visual Basic 2015 Programming.
17 Copyright © 2006, Oracle. All rights reserved. Information Publisher.
Code Generation Instruction Selection Higher level instruction -> Low level instruction Register Allocation Which register to assign to hold which items?
Copyright © 2006, Oracle. All rights reserved Rule Engine.
Introduction to Visual Basic 2008 Programming
Chapter 2: System Structures
Organization of Programming Languages
Microsoft Ignite NZ October 2016 SKYCITY, Auckland.
Exploring Microsoft® Access® 2016 Series Editor Mary Anne Poatsy
SNMPv2 OVERVIEW: LIMITATIONS OF SNMPv1 HISTORY OF SNMPv2 • HIERARCHIES
Job Attribute and Event Monitoring Methods
Presentation transcript:

DISTRIBUTED MANAGEMENT THREE APPROACHES ARE BEING DEFINED MIB BASED EXPRESSION MIB EVENT MIB NOTIFICATION LOG MIB SCRIPT BASED SCRIPT MIB SCHEDULE MIB REMOTE OPERATIONS BASED REMOTE OPERATIONS MIB Copyright © 2001 by Aiko Pras These sheets may be used for educational purposes

EXPRESSION AND EVENT MIB

EXPRESSION AND EVENT MIB: CHARACTERISTICS STANDARD MIB APPROACH RESEMBLES THE OLD SNMPv2 M2M MIB EXPRESSION MIB: INPUT ARE (WILDCARDED) VARIABLES OF A (LOCAL) MIB OPERATES ON ABSOLUTE AS WELL AS DELTA VALUES RICH SET OF EXPRESSIONS THE OUTPUT IS STORED IN THE VALUE TABLE THIS TABLE MAY SERVE AS INPUT FOR OTHER EXPRESSIONS EVENT MIB: INPUT ARE VARIABLES OF A (REMOTE) MIB TRIGGERS ON CHANGES, OR TRESHOLD CROSSING GENERATES A NOTIFICATION OR SET OPERATION

SCRIPT MIB H T T P S N M P SNMP I C M P M AAAAA RUNTIME ENVIRONMENT SCRIPT REPOSITORY TOP LEVEL AGENTS MANAGER INTERMEDIATE LEVEL MANAGER

SCRIPT MIB: CHARACTERISTICS FUNCTIONALITY CAN BE DEFINED AT RUN-TIME POWERFUL AUTONOMOUS ACTIONS MAY BE EASIER TO OPERATE FOR THE TOP-LEVEL MANAGER PROTECTION MECHANISMS NECESSARRY DIFFERENT SCRIPT LANGUAGES

SCRIPT MIB: STRUCTURE CONSISTS OF 6 TABLES

SCRIPT MIB: LANGUAGE TABLE DEFINES THE LANGUAGES THIS SYSTEM SUPPORTS AN OID TO INDICATE THE LANGUAGE THE VERSION AN OID TO INDICATE THE VENDOR THE REVISION A DESCRIPTION TABLE IS READ ONLY

SCRIPT MIB: EXTENSIONS TABLE DEFINES THE EXTENSIONS FOR EACH LANGUAGE AN OID TO INDICATE THE EXTENSION THE VERSION AN OID TO INDICATE THE VENDOR THE REVISION A DESCRIPTION TABLE IS READ ONLY

SCRIPT MIB: SCRIPT TABLE LISTS ALL SCRIPTS KNOWN TO THE SYSTEM ALLOWS TO: DOWNLOAD SCRIPTS FROM A URL (PULL MODEL) READ SCRIPTS FROM LOCAL NON-VOLATILE STORAGE STORE SCRIPTS IN LOCAL NON-VOLATILE STORAGE DELETE SCRIPTS FROM LOCAL NON-VOLATILE STORAGE LIST PERMANENT SCRIPTS (THAT CAN NOT BE CHANGED OR REMOVED) READ AND MODIFY THE SCRIPT STATUS (ENABLED, DISABLED, EDITING )

SCRIPT MIB: CODE TABLE LISTS THE CODE OF A SCRIPT ALLOWS TO: DOWNLOAD SCRIPTS VIA SNMP (PUSH MODEL) MODIFY SCRIPTS VIA SNMP (EDITING ) IMPLEMENTATION IS OPTIONAL

SCRIPT MIB: LAUNCH TABLE ALLOWS TO: ASSOCIATE A SCRIPT WITH A ‘PERSON’ WHO INVOKES EXECUTION PROVIDE ARGUMENTS AND PARAMETERS FOR SCRIPT INVOCATION INVOKE SCRIPTS WITH A SINGLE SET OPERATION CONTROL THE NUMBER OF ACTIVE INVOCATIONS CONTROL THE TOTAL NUMBER OF INVOCATIONS

SCRIPT MIB: RUN TABLE ALLOWS TO: RETRIEVE STATUS INFORMATION FROM RUNNING SCRIPTS CONTROL RUNNING SCRIPTS (SUSPEND, RESUME, ABORT) RETRIEVE RESULTS FROM RECENTLY TERMINATED SCRIPTS CONTROL THE REMAINING MAXIMUM LIFETIME OF A RUNNING SCRIPT CONTROL HOW LONG SCRIPT RESULTS ARE ACCESSIBLE

SCHEDULE MIB PERFORMS SET OPERATIONS FOR EXAMPLE ON THE SCRIPT MIB TARGET MUST BE Integer32 ON A PERIODIC OR CALENDER DRIVEN BASE

REMOTE OPERATIONS MIB PING MIB TO PERFORM PING FROM A REMOTE HOST TRACEROUTE MIB TO PERFORM TRACEROUTE FROM A REMOTE HOST NAME LOOKUP MIB TO PERFORM NAME LOOKUP FROM A REMOTE HOST